Browse Title Index


 
Issue Title
 
Vol 25, No 3 (2024) Analysis of Reading Behavior Based on Students’ Cognitive Styles and Learning Styles Abstract
Juan Zhou, Hideyuki Takada, Chengjiu Yin
 
Vol 16, No 3 (2015) Analysis of SCTP Concurrent Multipath Transfer in Vehicular Network Communication Abstract
Jing-Yi Gan, Neal Naixue Xiong, Hui-Min Wen, Qing-Zhen Zhu
 
Vol 21, No 4 (2020) Analysis of the New Method for Assessing the Total Network Capacity of Wireless Mesh Networks for IoT Devices Abstract   PDF
El Miloud Ar-Reyouchi
 
Vol 21, No 5 (2020) Analysis on Parking Sharing Capacity Based on Supply-Demand Relationship Abstract   PDF
Weiwei Liu, Chennan Zhang, Hao Sun, Jianming Zhang, Gwang-jun Kim
 
Vol 24, No 3 (2023) Analysis on Risk Awareness Model and Economic Growth of Finance Industry Abstract   PDF
Renyang Wang, Badamasi Sani Mohammed, R. Parthasarathy
 
Vol 17, No 7 (2016) Analytical Model of Adaptive Cross-Layer-Based TCP Congestion Control for Wireless Mobile Cloud Access Abstract
Ben-Jye Chang, Ying-Hsin Liang, Jun-Yu Jin
 
Vol 16, No 1 (2015) Analyzing Distributed Remote Process Execution Using Queuing Model Abstract
Susmit Bagchi
 
Vol 20, No 1 (2019) Analyzing Google Trends with Travel Keyword Rankings to Predict Tourists into a Group Abstract   PDF
Jui-Hung Chang, Chien-Yuan Tseng
 
Vol 11, No 5 (2010) Analyzing Mediated Service Protocol Interactions Considering User's Expectation Abstract
Zhang-Bing Zhou, Han-Chieh Chao, Sami Bhiri, Lei Shu, Manfred Hauswirth
 
Vol 12, No 6 (2011) Analyzing Mediated Service Protocol Interactions Considering User's Expectation Abstract
Zhangbing Zhou, Han-Chieh Chao, Sami Bhiri, Lei Shu, Manfred Hauswirth
 
Vol 24, No 6 (2023) Analyzing the Influence of Internet Usage Behavior on Spectator Sports Consumption Among College Students: An Empirical SEM Study Based on the SOR Model Abstract
Yujie Zhang, Yuyang Hou, Luning Cao, You Xiong, Qian Huang
 
Vol 19, No 1 (2018) Android App Copy Protection Mechanism with Semi-trusted Loader Abstract   PDF
Kuo-Yu Tsai
 
Vol 23, No 6 (2022) Android Malware Application Detection Method Based on RGB Image Features in E-Commerce Abstract   PDF
Xingyu Li, Yongli Tang, Mary Subaja Christo, Zongqu Zhao, Ying Li
 
Vol 3, No 2 (2002) Animation Templates for WAP Abstract
Jyh-Huei Chang
 
Vol 21, No 3 (2020) Anomaly Detection in Crowded Scenes Based on Group Motion Features Abstract   PDF
Shuqiang Guo, Dongxue Li, Lili Yao
 
Vol 25, No 3 (2024) Anomaly Detection Model of Time Segment Power Usage Behavior Using Unsupervised Learning Abstract
Wen-Jen Ho, Hsin-Yuan Hsieh, Chia-Wei Tsai
 
Vol 23, No 4 (2022) Anomaly Detection of Dam Monitoring Data based on Improved Spectral Clustering Abstract   PDF
Lixia Ji, Xiao Zhang, Yao Zhao, Zongkun Li
 
Vol 10, No 3 (2009) Anonymity Scheme for Interactive P2P Services Abstract
Sharon Shitrit, Eyal Felstaine, Niv Gilboa, Ofer Hermoni
 
Vol 15, No 6 (2014) Anonymous Authentication and Key-Agreement Schemes in Vehicular Ad-Hoc Networks Abstract
Cheng-Yeh Chen, Te-Cheng Hsu, Hsin-Te Wu, John Y. Chiang, Wen-Shyong Hsieh
 
Vol 10, No 1 (2009) Anonymous Authentication for Wireless Access in Internet from Pairings Abstract
Shyi-Tsong Wu, Jung-Hui Chiu, Bin-Chang Chieu
 
Vol 20, No 1 (2019) Anonymous Delegation-based Authenticated Key Agreement Protocol for Global Mobility Networks with Communication Privacy Abstract   PDF
Zuowen Tan
 
Vol 20, No 7 (2019) Anonymous Message Authentication Using Modified Random Secret Pre-distribution for VANETs under Sparse RSUs Environment Abstract   PDF
Chih-Hsueh Lin
 
Vol 11, No 4 (2010) Another Security Weakness in an Authenticated Group Key Agreement Abstract
Z. Eslami, S. Kabiri Rad
 
Vol 14, No 5 (2013) Ant-Based Balancing Energy Routing Protocol for Mobile Ad Hoc Networks Abstract
Ji-Peng Zhou, Jian-Zhu Lu, Jin Li
 
Vol 17, No 2 (2016) Antenna Design and Cell Division for HAPS Communication Abstract
Ming-Xiang Guan, Le Wang
 
726 - 750 of 2669 Items << < 25 26 27 28 29 30 31 32 33 34 > >>